Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 4 Question 63 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 63
Topic #: 4
[All ISSEP Questions]

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

Show Suggested Answer Hide Answer
Suggested Answer: B

Answer option A is incorrect. The Defense Technical Information Center (DTIC) is a repository of

scientific and technical documents for the United States Department of Defense. DTIC serves the

DoD community as the largest central resource for DoD and government-funded scientific, technical,

engineering, and business related information available today. DTIC's documents are available to

DoD personnel and defense contractors, with unclassified documents also available to the public.

DTIC's aim is to serve a vital link in the transfer of information among DoD personnel, DoD

contractors, and potential contractors and other U.S. Government agency personnel and their

contractors. Answer option D is incorrect. The Defense Advanced Research Projects Agency (DARPA)

is an agency of the United States Department of Defense responsible for the development of new

technology for use by the military. DARPA has been responsible for funding the development of

many technologies which have had a major effect on the world, including computer networking, as

well as NLS, which was both the first hypertext system, and an important precursor to the

contemporary ubiquitous graphical user interface. DARPA supplies technological options for the

entire Department, and is designed to be the 'technological engine' for transforming DoD. Answer

option C is incorrect. The Defense-wide Information Assurance Program (DIAP) protects and

supports DoD information, information systems, and information networks, which is important to

the Department and the armed forces throughout the day-to-day operations, and in the time of

crisis.The DIAP uses the OSD method to plan, observe, organize, and incorporate IA activities. The

role of DIAP is to act as a facilitator for program execution by the combatant commanders, Military

Services, and Defense Agencies. The DIAP staff combines functional and programmatic skills for a

comprehensive Defense-wide approach to IA. The DIAP's main objective is to ensure that the DoD's

vital information resources are secured and protected by incorporating IA activities to get a secure

net-centric GIG operation enablement and information supremacy by applying a Defense-in-Depth

methodology that integrates the capabilities of people, operations, and technology to establish a

multi-layer, multidimensional protection.


Contribute your Thoughts:

Walton
10 days ago
CDSA? Sounds like some kind of corporate security buzzword. I'll pass on that one.
upvoted 0 times
...
Ena
18 days ago
IPSec sounds like the right answer here. It's a well-known security protocol that protects communications at the network layer.
upvoted 0 times
...
Alba
18 days ago
I'm not sure, but I think C) File encryptors could also be a valid option for addressing data security problems
upvoted 0 times
...
Terrilyn
20 days ago
I agree with Yvonne, IPSec provides layered security services for communications and data security
upvoted 0 times
...
Yvonne
21 days ago
I think the answer is A) Internet Protocol Security (IPSec)
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77